{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:55:00Z","timestamp":1742918100696,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491059"},{"type":"electronic","value":"9783319491066"}],"license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49106-6_90","type":"book-chapter","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T06:33:13Z","timestamp":1477031593000},"page":"885-892","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Oblivious Transfer Protocols Based on Group Factoring Problem"],"prefix":"10.1007","author":[{"given":"Jing","family":"Li","sequence":"first","affiliation":[]},{"given":"Xiong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Licheng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Debiao","family":"He","sequence":"additional","affiliation":[]},{"given":"Xinxin","family":"Niu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"key":"90_CR1","doi-asserted-by":"crossref","unstructured":"Camenisch J, Neven G, Shelat A.: Simulatable adaptive oblivious transfer. EURO- CRYPT, pp. 573-590, 2007.","DOI":"10.1007\/978-3-540-72540-4_33"},{"key":"90_CR2","unstructured":"Cao Z.J., Liu L.H.: Improvement of One Adaptive Oblivious Transfer Scheme. IACR Cryptology ePrint Archive 2013. URL: \n                    eprint.iacr.org\/2013\/517\n                    \n                  ."},{"key":"90_CR3","unstructured":"Childs A.M. and Ivanyos G.: Quantum computation of discrete logarithms in semi- groups. CoRR, Vol. abs\/1310.6238, 2013."},{"key":"90_CR4","unstructured":"Green, M. Hohenberger, S.: Practical adaptive oblivious transfer from simple as- sumptions. In: Yuval, I., (Ed.) TCC 2011. LNCS, 6597, Springer, Heidelberg, pp. 347-363, 2011."},{"key":"90_CR5","unstructured":"Grohmann B.: A new protocol for 1-2 oblivious transfer. CoRR, Vol. abs\/0904.2023, 2009. \n                    http:\/\/eprintiacr.org\/2009\/172\n                    \n                  ."},{"key":"90_CR6","unstructured":"Gu L.Z. Wang L.C. Ota K. Dong M.X. Cao Z.F. Yang Y.X.: New public key cryp- tosystems based on non-abelian factorization problems. Security and Communication Networks, 6(7): pp. 912-922, 2013."},{"key":"90_CR7","doi-asserted-by":"crossref","unstructured":"Habeeb M. Kahrobaei D. Koupparis C. and Shpilrain V.: Public key exchange using semidirect product of (semi) groups. LNCS, 7954, pp. 475-486, 2013.","DOI":"10.1007\/978-3-642-38980-1_30"},{"key":"90_CR8","unstructured":"Huang H.F. Chang C.C.: A new t-out-of-n oblivious transfer with low bandwith. Applied Mathematical Sciences, pp. 311-320, 2007."},{"key":"90_CR9","doi-asserted-by":"crossref","unstructured":"Kahrobaei D. Koupparis C. Shpilrain V.: Public key exchange using matrices over group rings. Groups-Complexity-Cryptology, 5, pp. 97-115, 2013.","DOI":"10.1515\/gcc-2013-0007"},{"key":"90_CR10","doi-asserted-by":"crossref","unstructured":". Lempken W., Magliveras S.S., van Trung T., Wei W.: A public key cryptosys- tem based on non-abelian _nite groups. Journal of Cryptology: the journal of the International Association for Cryptologic Research, 22(1), pp. 62-74, January 2009.","DOI":"10.1007\/s00145-008-9033-y"},{"key":"90_CR11","unstructured":"Lipmaa H.: New Communication-E_cient Oblivious Transfer Protocols Based on Pairings. IACR Cryptology ePrint Archieve 2007. Vol. 2007, p. 133, 2007. URL: \n                    http:\/\/eprint.iacr.org\/2007\/133\n                    \n                  ."},{"key":"90_CR12","doi-asserted-by":"crossref","unstructured":". Monico C and Neusel M. D.: Cryptanalysis of a system using matrices over grouprings. Groups Complexity Cryptology, 7(2), pp. 175-182, 2015.","DOI":"10.1515\/gcc-2015-0008"},{"key":"90_CR13","doi-asserted-by":"crossref","unstructured":"Myasnikov A.D., Ushakov A.: Quantum algorithm for the discrete logarithm prob-lem for matrices over group rings. Groups Complexity Cryptology, pp. 31-36, 2014.","DOI":"10.1515\/gcc-2014-0003"},{"key":"90_CR14","doi-asserted-by":"crossref","unstructured":"Myasnikov A.G., Shpilrain V., Ushakov A., Mosina N. Non-commutative cryptog-raphy and complexity of group-theoretic problems. vol. 177. American Mathematical Society Providence, RI, USA; 2011.","DOI":"10.1090\/surv\/177"},{"key":"90_CR15","doi-asserted-by":"crossref","unstructured":"Parakh A.: Oblivious transfer using elliptic curves. CRYPTOLOGIA: Cryptologia 31(2), pp. 125-132, 2007.","DOI":"10.1080\/01611190601144478"},{"key":"90_CR16","unstructured":"Rabin, M. How to exchange secrets by oblivious transfer. Technical Report TR-81, Aiken Computation Laboratory, Harvard University 1981."},{"key":"90_CR17","doi-asserted-by":"crossref","unstructured":"Shor P.W.: Polynomial-time algorithms for prime factorization and discrete loga- rithme on a quantum computer. SIAM Journal on Computing, pp. 1484-1509, 1997.","DOI":"10.1137\/S0097539795293172"},{"key":"90_CR18","unstructured":"Yang YG., Sun SJ., Pan QX., Xu P.: Reductions between private information retrieval and blivious transfer at quautam level. Optik, 126(21), pp. 3206-3209, 2015."}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on Broad-Band Wireless Computing, Communication and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49106-6_90","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T05:34:48Z","timestamp":1558157688000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49106-6_90"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"ISBN":["9783319491059","9783319491066"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49106-6_90","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2016,10,22]]},"assertion":[{"value":"22 October 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BWCCA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Broadband and Wireless Computing, Communication and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 November 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 November 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bwcca2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/bwcca\/2016\/venue.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}